Skip to content

Commit 79f1e20

Browse files
committed
freshness113
1 parent 9ddffdf commit 79f1e20

File tree

1 file changed

+13
-16
lines changed

1 file changed

+13
-16
lines changed

articles/hdinsight/hdinsight-extend-hadoop-virtual-network.md

Lines changed: 13 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -431,15 +431,12 @@ Set-AzVirtualNetworkSubnetConfig `
431431
$vnet | Set-AzVirtualNetwork
432432
```
433433

434-
> [!IMPORTANT]
435-
> This example demonstrates how to add rules to allow inbound traffic on the required IP addresses. It does not contain a rule to restrict inbound access from other sources.
436-
>
437-
> The following example demonstrates how to enable SSH access from the Internet:
438-
>
439-
> ```powershell
440-
> Get-AzNetworkSecurityGroup -Name hdisecure -ResourceGroupName RESOURCEGROUP |
434+
This example demonstrates how to add rules to allow inbound traffic on the required IP addresses. It does not contain a rule to restrict inbound access from other sources. The following code demonstrates how to enable SSH access from the Internet:
435+
436+
```powershell
437+
Get-AzNetworkSecurityGroup -Name hdisecure -ResourceGroupName RESOURCEGROUP |
441438
Add-AzNetworkSecurityRuleConfig -Name "SSH" -Description "SSH" -Protocol "*" -SourcePortRange "*" -DestinationPortRange "22" -SourceAddressPrefix "*" -DestinationAddressPrefix "VirtualNetwork" -Access Allow -Priority 306 -Direction Inbound
442-
> ```
439+
```
443440

444441
### Azure CLI
445442

@@ -485,14 +482,14 @@ Use the following steps to create a virtual network that restricts inbound traff
485482
486483
Once this command completes, you can install HDInsight into the Virtual Network.
487484
488-
> [!IMPORTANT]
489-
> These steps only open access to the HDInsight health and management service on the Azure cloud. Any other access to the HDInsight cluster from outside the Virtual Network is blocked. To enable access from outside the virtual network, you must add additional Network Security Group rules.
490-
>
491-
> The following example demonstrates how to enable SSH access from the Internet:
492-
>
493-
> ```azurecli
494-
> az network nsg rule create -g RESOURCEGROUP --nsg-name hdisecure -n ssh --protocol "*" --source-port-range "*" --destination-port-range "22" --source-address-prefix "*" --destination-address-prefix "VirtualNetwork" --access "Allow" --priority 306 --direction "Inbound"
495-
> ```
485+
486+
These steps only open access to the HDInsight health and management service on the Azure cloud. Any other access to the HDInsight cluster from outside the Virtual Network is blocked. To enable access from outside the virtual network, you must add additional Network Security Group rules.
487+
488+
The following code demonstrates how to enable SSH access from the Internet:
489+
490+
```azurecli
491+
az network nsg rule create -g RESOURCEGROUP --nsg-name hdisecure -n ssh --protocol "*" --source-port-range "*" --destination-port-range "22" --source-address-prefix "*" --destination-address-prefix "VirtualNetwork" --access "Allow" --priority 306 --direction "Inbound"
492+
```
496493

497494
## <a id="example-dns"></a> Example: DNS configuration
498495

0 commit comments

Comments
 (0)